7 An Ecosystem Approach to Future Cyber Security Capabilities EDUCATION AND TRAINING Dr. Gregory B. White University of Texas at San Antonio

8 Education and Training A growing need for cybersecurity professionals Job openings expected to increase 36.5% by 2022 It is pretty much impossible to hire folks with the indicated backgrounds There are maybe four or five thousand people in North America I can hire right now who have the technical skills keen to us. Alex Stamos, CIO Yahoo

21 Directions Collaborative research project with the UT System Schools Cyber Physical Systems Security with focus on Oil and Gas,. Jointly prepare MURI topics and send to AFOSR, ONR, ARO, so that our topics can get into the MURI BAA Joint education initiative to NSF and other agencies Joint proposals to NSF SatC (Security and Trustworthy Cyber Space program) Work with UT System to have a joint initiative with public/private partnerships

28 PRIVATE Dialog: IBM Connections Cloud Features Secure tool for sharing information, documenting activities, and communicating Defined Communities by invitation Capability to create sub communities Shared files that can be shared by all or part of of the community Features Wiki Blog Forum Ideation Activities: documentation of meetings, efforts, and action items REMARKS The health of the ecosystem requires interactions among the components. Cyber Security challenges are complex and need involvement from multiple areas and sectors. Connections across academia and public/private sectors will yield synergistic, system outcomes.

29 Contact Dr. Ann Q. Gates Acknowledgements: Supported in part by the National Science Foundation under Grant Nos. HRD and DUE Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.

32 MANUFACTURING IS THE DOMINANT WEALTH-PRODUCING SECTOR OF THE TEXAS ECONOMY. The reach of the goods-producing sector is throughout the rest of the economy is impressive: Professional and Business Services, Government, Construction, Finance & Insurance, Transportation & Warehousing and Utilities Source: Dallas Morning News, A Crude Awakening, December 8, 2014, D 1. Texas Remains a Manufacturing Powerhouse

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu January 2014 1/29/2014 1 Our History NSA/DHS Center for Excellence in Cyber Security Education

HOW I BUILT A CYBER SECURITY RESEARCH CENTER FROM GROUND ZERO Dr. Bhavani Thuraisingham Louis A. Beecherl, Jr. I Distinguished Professor of Computer Science Director of the Cyber Security Research Center

The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation

NSF Workshop on Big Data Security and Privacy Report Summary Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 Acknowledgement NSF SaTC Program for support Chris Clifton and

Introducing the federal cybersecurity R&D strategic plan Douglas Maughan, Bill Newhouse, and Tomas Vagoun In December 2011, the White House Office of Science and Technology Policy (OSTP) released the document,

HIGHER EDUCATION AND THE NEW VIRGINIA ECONOMY: MASON LEADS THE WAY Ángel Cabrera, President George Mason University NAIOP Northern Virginia December 9, 2015 George Mason University is Virginia s largest

US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related

According to CNNMoney, 8 of the top 20 fastest growing jobs are in computing. Make your way to Pace s Seidenberg School and go to the head of the line. Work toward greatness. One Pace Plaza New York, NY

University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

Preface: The U. T. System Board of Regents unanimously adopted A Framework for Advancing Excellence throughout The University of Texas System (Framework) presented by Chancellor Francisco G. Cigarroa at

TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,

College of Business The University of Texas at Brownsville and Texas Southmost College Facts and Figures SCOB Facts and Figures 1 Mission Prepare students in the Lower Rio Grande Valley of Texas for their

Developing and Securing the Cloud Bhavani Thuraisingham @ CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informs business AN AUERBACH

Master of Cyber Security Dr. Winnie Callahan Assoc. Director, Informatics Meghan Balding Graduate & Professional Programs September 17, 2013 WebEx Quick Facts Will I be able to get a copy of the slides

Prairie View A&M University Computer Science Department 招 生 简 介 Prairie View A&M University A member of Texas A&M University Systems Founded in 1876, the 2 nd oldest state institution of Texas, located

The National Consortium for Data Science (NCDS) A Public-Private Partnership to Advance Data Science Ashok Krishnamurthy PhD Deputy Director, RENCI University of North Carolina, Chapel Hill What is NCDS?

ARTICLE C.1. STATEMENT OF WORK This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and Human Services (DHHS), and all other federal agencies to acquire

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College

PAGE 6 of 51 SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Statement of Work This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and

PH.D. IN BUSINESS ADMINISTRATION Intellectual Discovery AND INNOVATION join a nationally ranked program that is accredited by AACSB International, placing the UTSA College of Business in the top five percent

Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

Seed Grants for Interdisciplinary Research in Big Data Texas A&M Engineering Experiment Station and the Dwight Look College of Engineering in partnership with the Texas A&M University Division of Research

TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

Strategic Plan Fiscal Years 2012-2016 Creating Value Through Collaboration VISION The vision of the UT System Supply Chain Alliance is to be a leader in the delivery of world-class supply chain services

TESTIMONY OF C. MAULI AGRAWAL VICE PRESIDENT FOR RESEARCH THE UNIVERSITY OF TEXAS AT SAN ANTONIO BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY HONORABLE

Finding & Integrating CyberTech in the U.S. Government Mary Ellen Seale National Protection and Programs Directorate May 16, 2012 Obtaining Federal Funding Understanding the Landscape Contracting Small

Computer Science College of Engineering EDUCATION MAKE AN IMPACT As part of Kansas State University s College of Engineering, the Computer Science department is committed to offering high quality degree

College of Engineering and Applied Science Building a Strong Backbone for STEM Education Dr Robert Block, Assistant Dean Welcome to the PLTW Conference! About the Engineering College (EAS) EAS STEM Degrees

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto

The Future of Cybersecurity Education Being Better than Best Practices Mark Heckman, Ph.D., CISSP, CISA Center for Cyber Security Engineering and Technology University of San Diego Severe Cybersecurity

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure

SCHOOL OF INFORMATICS AND COMPUTING Exceed Expectations Our programs will exceed your expectations and help you exceed your own. Our students and faculty are breaking new ground every day: creating applications

ENGINEERING What can I do with this major? ANY ENGINEERING DISCIPLINE Research and Development Design Production Operations Management Teaching Consulting Sales and Marketing Law Manufacturing Healthcare

Integrated Ecosystems Toronto s Complete Business Performance System Business Case In association with: The Information and Communications Technology Council (ICTC) is a centre of expertise in ICT business

Discover Viterbi: Systems Architecting & Engineering Professor Azad Madni Meghan McKenna Balding November 9, 2015 WebEx Quick Facts Will I be able to get a copy of the slides after the presentation? YES!

The Land of Opportunity Where is Texas? Borders New Mexico, Oklahoma, Arkansas, Louisiana and International border with Mexico Population: 26 Million Size: 2 nd Largest state in the U.S. With more than

SCHOOL OF INFORMATICS AND COMPUTING Programs that matter Our programs will change the way you think and expand your opportunities. Our students and faculty are breaking new ground every day: creating applications

Institute for Cyber Security The Institute for Cyber Security (ICS) conducts basic and applied research in partnership with academia, government and industry. The Institute's Executive Director Prof. Ravi

To ensure the functioning of the site, we use cookies. We share information about your activities on the site with our partners and Google partners: social networks and companies engaged in advertising and web analytics. For more information, see the Privacy Policy and Google Privacy &amp Terms.
Your consent to our cookies if you continue to use this website.